898 resultados para Victims of terrorism
Resumo:
"Serial no. 39."
Resumo:
Mode of access: Internet.
Resumo:
Jointly funded by ILEC Grant no. 2437 & 2915 and the Chicago Community Trust.
Resumo:
"April 1985."
Resumo:
"December 1986."
Resumo:
The September 11 terrorist attacks in the United States have reconfigured the global public debates as of how to defend a "civilized" world from the "Islamic terrorism." The U.S.-led war on terror against extremist groups also produced and triggered a particular discourse in the former Yugoslav countries. The main aim of this article is to present an example of a study that explores how media appropriate dominant global antiterrorism discourse and apply it to a local context to legitimize and justify specific ideologies and discourse. As our critical discourse analysis shows, Serbian and Croatian newspapers apply the global discourse of terrorism to their local context to excuse their nationalisms and the past military actions against the Muslims in former Yugoslav wars, and with that, they assert their belonging to an antiterrorism global discursive community. © 2006 Sage Publications.
Resumo:
Dynamic Alliances: Strengthening ties between the GCC and Asia
Resumo:
Purpose - To study how the threats of terrorism are being handled by a variety of UK companies in the travel and leisure sector in the UK in the post 9/11 era. Design/methodology/approach - A review of the literature of risk management in a world that is perceived to be more risky as a result of the terrorist attacks on the US on 11 September 2001 (9/11) is presented. Describes the application of theories of organizational resilience and institutions to frame an understanding of how managers make sense of terrorism risk and comprehend uncertainty. Reports a qualitative analysis of themes in interviews conducted with 25 managers from 6 unnamed organizations in the aviation industry (3 organizations) and the UK travel and leisure industry (3 organizations), representing a catering supplier, an airport, an airline, a tour company, a convention centre, and an arts and entertainment centre. Findings - The results indicated that the three organizations in the aviation industry prioritize threats from terrorism, whilst the three organizations in the leisure and travel sector do not, suggesting that the managers in the travel and leisure industry apply a probabilistic type of thinking and believe the likelihood of terrorism to be low. Reports that they give precedence to economic concerns and numerous other threats to the industry. Concludes that managers fall prey to the 'ludic fallacy', which conceives all odds as being calculable and hence managers conceive the terrorism risk as low while also expecting institutional factors to pre-empt and control terrorism threats, a reaction which the authors believe to be rather complacent and dangerous. Originality/value - Contributes to the research literature on risk management by revealing the gap in the ability of existing management tools and methodologies to deal with current and uncertain threats facing organizations due to terrorism.
Resumo:
This paper describes the first study to focus exclusively on the prevalence and impact of cyberstalking. A Web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 169 respondents completed the questionnaire. The results of the study found that approximately a third of respondents might be considered victims of cyberstalking. Furthermore, when asked to indicate the level of distress felt as a result of their experiences, almost a quarter of respondents chose a value of ten on a ten-point scale. The study also suggests a number of differences between cyberstalking and offline stalking, for instance cyberstalking tends to take place over a shorter period of time than offline stalking and cyberstalking victims are less likely to know the identify of their harassers. These differences add weight to the argument that cyberstalking should be seen as a new form of deviant behaviour that can be distinguished from offline stalking. The work concludes by emphasising a need for further research.
Resumo:
This study evaluated the early development and pilot-testing of Project IMPACT, a case management intervention for victims of stalking. The Design and Development framework (Rothman & Thomas, 1994) was used as a guide for program development and evaluation. Nine research questions examined the processes and outcomes associated with program implementation. ^ The sample included all 36 clients who participated in Project IMPACT between February of 2000 and June of 2001, as well as the victim advocates who provided them with services. Quantitative and qualitative data were drawn from client case files, participant observation field notes and interview transcriptions. Quantitative data were entered into three databases where: (1) clients were the units of analysis (n = 36), (2) services were the units of analysis (n = 1146), and (3) goals were the units of analysis (n = 149). These data were analyzed using descriptive statistics, Pearson's Chi-square, Spearman's Rho, Phi, Cramer's V, Wilcoxon's Matched Pairs Signed-Ranked Test and McNemar's Test Statistic. Qualitative data were reduced via open, axial and selective coding methods. Grounded theory and case study frameworks were utilized to analyze these data. ^ Results showed that most clients noted an improved sense of well-being and safety, although residual symptoms of trauma remained for numerous individuals. Stalkers appeared to respond to criminal and civil justice-based interventions by reducing violent and threatening behaviors; however, covert behaviors continued. The study produced findings that provided preliminary support for the use of several intervention components including support services, psycho-education, safety planning, and boundary spanning. The psycho-education and safety planning in particular seemed to help clients cognitively reframe their perceptions of the stalking experience and gain a sense of increased safety and well-being. A 65% level of satisfactory goal achievement was observed overall, although goals involving justice-based organizations were associated with lower achievement. High service usage was related to low-income clients and those lacking in social support. Numerous inconsistencies in program implementation were found to be associated with the skills and experiences of victim advocates. Thus, recommendations were made to further refine, develop and evaluate the intervention. ^
Resumo:
This dissertation examines novels that use terrorism to allegorize the threatened position of the literary author in contemporary culture. Allegory is a term that has been differently understood over time, but which has consistently been used by writers to articulate and construct their roles as authors. In the novels I look at, the terrorist challenge to authorship results in multiple deployments of allegory, each differently illustrating the way that allegory is used and authorship constructed in the contemporary American novel. Don DeLillo’s Mao II (1991), first puts terrorists and authors in an oppositional pairing. The terrorist’s ability to traffic in spectacle is presented as indicative of the author’s fading importance in contemporary culture and it is one way that terrorism allegorizes threats to authorship. In Philip Roth’s Operation Shylock (1993), the allegorical pairing is between the text of the novel and outside texts – newspaper reports, legal cases, etc. – that the novel references and adapts in order to bolster its own narrative authority. Richard Powers’s Plowing the Dark (1999) pairs the story of an imprisoned hostage, craving a single book, with employees of a tech firm who are creating interactive, virtual reality artworks. Focusing on the reader’s experience, Powers’s novel posits a form of authorship that the reader can take into consideration, but which does not seek to control the experience of the text. Finally, I look at two of Paul Auster’s twenty-first century novels, Travels in the Scriptorium (2007) and Man in the Dark (2008), to suggest that the relationship between representations of authors and terrorists changed after 9/11. Auster’s author-figures forward an ethics of authorship whereby novels can use narrative to buffer readers against the portrayal of violent acts in a culture that is suffused with traumatizing imagery.
Resumo:
As the number of high profile cases of institutional child abuse mounts internationally, and the demands of victims for justice are heard, state responses have ranged from prosecution, apology, and compensation schemes, to truth commissions or public inquiries. Drawing on the examples of Australia and Northern Ireland as two jurisdictions with a recent and ongoing history of statutory inquiries into institutional child abuse, the article utilises the restorative justice paradigm to critically evaluate the strengths and limitations of the inquiry framework in providing ‘justice’ for victims. It critically explores the normative and pragmatic implications of a hybrid model as a more effective route to procedural justice and suggests that an appropriately designed restorative pathway may augment the legitimacy and utility of the public inquiry model for victims chiefly via improving offender accountability and ‘voice’ for victims. The article concludes by offering some thoughts on the broader implications for other jurisdictions in responding to large-scale historical abuses and seeking to come to terms with the legacy of institutional child abuse.